Security

G Suite has been built from the ground up to mitigate the unique threats for
cloud systems. Google’s standards for performance and reliability apply to
businesses, schools and government institutions around the world.

The technology, scale, and agility of our infrastructure bring unique
security benefits to our customers. Our vast network of data centers are
built with custom-designed servers, that run our own operating system for
security and performance. Because Google controls its entire hardware stack,
we are able to quickly respond to threats that may emerge.

Google employs dedicated security professionals to work on protecting your
data, including some of the world’s foremost experts in computer security.
Just like all teams at Google, this team is constantly innovating and making
the future more secure, not just for Google’s billion users, but for business
organizations as well.

Google has an outstanding track record of protecting user data. We protect
this data from outside intrusions as well as insider threats. In addition, we
tightly restrict and monitor any internal access to user data. The small set
of employees with access is subject to rigorous authentication measures,
detailed logging, and activity scanning to detect inappropriate access via
log analysis.

It is this unique combination of people, technology and agility that ensure
your data is secure at Google. For more information, check out the G Suite Security Whitepaper.

Google undergoes several independent third-party audits on a regular basis.
These independent auditors examine the controls present in our data centers,
infrastructure, and operations. Examples of these audits and standards
include:

G Suite for Education can be used in compliance with laws and regulations
important to schools.

Is G Suite HIPAA compliant?

G Suite supports customers’ compliance with the U.S. Health Insurance
Portability and Accountability Act (HIPAA), which governs the safeguarding,
use, and disclosure of protected health information (PHI). Customers who are
subject to HIPAA and wish to use G Suite for PHI processing or storage can
sign a business associate
amendment with Google. View more details about HIPAA
compliance with G Suite.

How does Google respond to government requests for data?

Respect for the privacy and security of data you store with Google underpins
our approach to producing data in response to legal requests. When we receive
such a request, our team reviews the request to make sure it satisfies legal
requirements and Google's policies. Generally speaking, for Google to produce
any data, the request must be made in writing, signed by an authorized
official of the requesting agency and issued under an appropriate law. If we
believe a request is overly broad, we'll seek to narrow it. For more
information, visit Google’s Transparency Report.

Does Google encrypt my data?

Core customer data that is uploaded or created in G Suite services is
encrypted at rest, as described in this help
center article.

This encryption happens as it is written to disk, without the customer having
to take any action. Google encrypts data with distinct encryption keys, even
if they belong to the same customer. Data is encrypted using 128-bit or
stronger Advanced Encryption Standard (AES).

Google encrypts core G Suite data while it is “in transit” as well, whether
it is traveling over the Internet between the customer and Google, or moving
within Google as it shifts from one data center to another. We encrypt this
data between Google and our customers using HTTPS with forward secrecy.

Do I need to use third-party tools to keep my data secure within Google?

Google offers the security features required for most customers directly in G
Suite. G Suite’s Business and Enterprise editions offer some additional
security features, such as advanced
Google Drive auditing and security keys management at scale. In all
plans, G Suite administrators have control over system configuration and
applications from within a single dashboard via our Admin console —regardless
of the size of the organization.

Administrators can access advanced tools immediately, including
authentication features like 2-Step verification and single sign-on, or email
security policies like secure transport (TLS) enforcement, IRM, and DLP which
can be configured in a few clicks.

For customers with security needs beyond what is included in G Suite, we
created a partner marketplace that extends our capabilities.

My organization is subject to EU data protection requirements. Can I use G
Suite?